scholarly journals Cluster-type models in the logistics industry

2018 ◽  
Vol 7 (1) ◽  
pp. 39
Author(s):  
Anatoliy Nyrkov ◽  
Sergei Sokolov ◽  
Anna Karpina ◽  
Alex Chernyakov ◽  
Vagiz Gaskarov

The aim of the present article is to detect the basic principles of secure electronic document circulation (EDCS) systems for multi-location structure with multiple non-uniform connections. As far as the object of research is concerned, transport-logistical clusters are used. It is heterogeneous system with implicit classification. In the article were examined the basic stages of designing, methods and models of information security in electronic document circulation systems, operating in distributed network and interacting with other informational systems. The article contains analysis of regulatory and legal base in information security field of Russian Federation. The model of cluster information flows has been created for research purposes, based on hierarchical interaction model of transport-logistical cluster components. We describe transport-logistical cluster subjects, categorized information and supposed information assets. Based on potential threats and system vulnerabilities, mechanisms of EDCS information security have been described. EDCS data exchange process with another system, containing personal data has been described. As a result, a comprehensive set of measures was formed as well as information security tools based on requirements for data protection of personal data, and automated control systemsand transport-logistical cluster information systems at critical objects.

2020 ◽  
Vol 2 (1) ◽  
pp. 55-61
Author(s):  
Żywiołek Justyna ◽  
Nedeliaková Eva

AbstractThe article presents results of research on the information flow between the client and the company, inside the company, and the problems encountered by both parties in the data exchange process. Also included are methods of securing information through unauthorized disclosure, disclosing ideas to other clients. The basis of the study was a survey directed to 75 customers ordering in the examined enterprise and a survey among 40 employees of that enterprise. The study was also based on an in-depth conversation with employees of the examined company employed at various levels. The survey shows that the clients and employees of the surveyed company are aware of the high value of information, and its security is considered one of the priorities. The survey clearly shows that customers praise data protection activities, they treat it as an element used to care for the interests of the customer, as a further environment of the product or service they purchase. However, there are often errors due to customer ignorance, communication problems, and lack of knowledge of employees. The study covered the importance of information in an enterprise as part of its competitive advantage, the reasons for investing in information protection, the occurrence of incidents, the degree of information security, and actions taken to protect information in an enterprise.


1976 ◽  
Vol 15 (02) ◽  
pp. 69-74
Author(s):  
M. Goldberg ◽  
B. Doyon

This paper describes a general data base management package, devoted to medical applications. SARI is a user-oriented system, able to take into account applications very different by their nature, structure, size, operating procedures and general objectives, without any specific programming. It can be used in conversational mode by users with no previous knowledge of computers, such as physicians or medical clerks.As medical data are often personal data, the privacy problem is emphasized and a satisfactory solution implemented in SARI.The basic principles of the data base and program organization are described ; specific efforts have been made in order to increase compactness and to make maintenance easy.Several medical applications are now operational with SARI. The next steps will mainly consist in the implementation of highly sophisticated functions.


Author(s):  
Oleksandr Malashko ◽  
◽  
Serhii Yesimov ◽  

The article examines trends in the development of legal regulation of information security in Ukraine in the context of the implementation of the Association Agreement between Ukraine and the European Union. The current information legislation and regulations on information security are analyzed. The tendencies in the legal regulation of information security that took place at the initial stage of the formation of information legislation are revealed. Based on the factors that took place before the adoption of the Doctrine of information security of Ukraine, the laws of Ukraine “On the basic principles of ensuring the cybersecurity of Ukraine”, “On the national security of Ukraine”, in the context of the current legislation, based on the methodology of legal forecasting, it is concluded that in the future the development of normative legal information security will be developed on the basis of by-laws, mainly at the departmental level.


2018 ◽  
Vol 13 ◽  
pp. 3281-3287
Author(s):  
Ahmed Zamzam ◽  
Alaa A. Qaffas

Without a common format, the financial community has been constantly penalized by the data exchange process. Currently, when financial data are dematerialized, they are exchanged in a multitude of formats: Excel files, free text, PDF, etc. Often not much more suitable for processing than photocopying and limited to certain platforms, these formats prove unsuitable for the exchange of information between programs, for analysis, comparison and presentation of reports to users. So far, despite a strong tendency to use XML syntax, attempts at convergence have struggled to generalize and apply to many sectors and contexts.In recent years, reporting requirements have led to a significant increase in the cost of using financial systems. The use of XBRL technology, using XML syntax, supported by many players in the world of finance, the software industry and adapted to reporting, can constitute the solution. Many governments, regulators, financial institutions are already using XBRL or have pilot projects in place.This document specifically targets XBRL. This technology, which is now recognized by the entire software industry, provides tremendous benefits for data exchange, storage, research and processing.


2018 ◽  
Vol 1 (102) ◽  
pp. 305
Author(s):  
Rosario Serra Cristóbal

Resumen:La gestión coordinada de las fronteras y el funcionamiento eficaz de los sistemas de tratamiento de datos de circulación de personas pueden servir como mecanismo de alerta temprana frente al riesgo de ataques terroristas. Puede fortalecer la capacidad colectiva de los Estados para detectar, prevenir y combatir el terrorismo al facilitar el intercambio oportuno de información, permitiendo así adoptar de forma responsable decisiones cruciales.Este trabajo analiza los concretos instrumentos de gestión de datos en fronteras que pueden ser útiles en la lucha antiterrorista, porque el primer paso en inteligencia reside en la obtención de información, que luego será analizada y tratada para convertir esa información en conocimiento. Como tendremos oportunidad de comprobar, muchas de las bases de datos en fronteras se crearon para controlar la entrada de inmigrantes en las fronteras europeas, pero la información que ofrecen dichos sistemas puede servir también para luchar contra ese reto que nos amenaza, el del terrorismo yihadista. No obstante, este trabajo subraya que se trata de fenómenos distintos.Es cierto que la nueva oleada de ataques yihadistas ha coincidido, en el mismo espacio temporal, con la mayor crisis migratoria a la que se ha tenido que enfrentar Europa debido a crisis humanitarias y posteriormente a la guerra de Siria u otros conflictos. Pero, no son lo mismo. El terrorismo yihadista y la inmigración poco o nada tienen que ver, por mucho que se hayan querido vincular o se hayan pretendido justificar determinadas políticas contra la inmigración como algo necesario para luchar contra el terrorismo yihadista, con el fácil argumento de que frenando la inmigración se evita la entrada de potenciales terroristas en Europa.El trabajo advierte del riesgo de que la lucha contra el terrorismo sea utilizada para reforzar los controles de personas en las fronteras con el verdadero objetivo de frenar los flujos migratorios. Al tiempo, subraya la necesidad de que en dichos controles se sigan directrices y prácticas claras y se respeten plenamente las obligaciones que los Estados tienen de conformidad con el Derecho internacional, tal como ha recordado el Tribunal Europeo de Derechos Humanos y el Tribunal de Justicia de la Unión Europea. De hecho, no son pocos los casos en los que estos Tribunales han subrayado la relevancia indubitada de principios como la reserva de ley, la necesidad o la proporcionalidad como sustrato de la licitud de muchas medidas que incluyen el tratamiento de datos personales.Summary:1. Jihadist terrorism as a cross-border phenomenon. 2. The benefit of data exchange on crossing-borders in the Schengen area. 3. New guidelines on data processing and the safeguard of national security. 4. The register of passengers (The Personal Name Record or PNR). 5. When the data cross the external borders. The exchange of data with third countries. 5.1. The failed PNR Agreement with Canada and the EU Court of Justice’s standards regarding the transfer of passengers’ data. 5.2. The exchange of data with the United States. The EU-US Umbrella Agreement and the Privacy Shield. 6. The use of profiles and blacklists of alleged terrorists in cross-bording. 7. ConclusionsAbstract:EU Coordinated border management and effective functioning of data processing systems related to the movement of persons may serve as an early warning mechanism against the risk of terrorist attacks. It can strengthen the collective capacity of States to detect, prevent and combat terrorism by facilitating the timely exchange of information, thereby enabling crucial decisions to be adopted in a responsible manner.This paper analyzes the concrete border data management tools that can be useful in the fight against terrorism. The first step in intelligence lies in obtaining information, which will then be analyzed and treated to turn that information into useful knowledge. As we will have an opportunity to verify, numerous border databases were created to control the entry of immigrants into European borders, but the information offered by these systems can also serve to fight against this challenge that threatens us, that of jihadist terrorism.Nevertheless, we emphasize that terrorism and immigration are different phenomena. The truth is that the new wave of Jihadist attacks took place along the largest migratory crisis that Europe faced due to different humanitarian crises and to the war in Syria and other conflicts. But they represent different realities. Jihadist terrorism and immigration have little or nothing in common. In spite of this, many wish to link both with a view to justify certain anti-immigration policies as necessary actions for coping with Jihadist terrorism. This has been done based on a simple narrative: holding back immigration prevents the entry of potential terrorists in Europe.This paper shows that the risk that the fight against terrorism will be used as a basis to reinforce people controls at the borders, while the true objective of these measures is to curb migratory flows. At the same time, it underlines the need for clear guidelines and practices to be followed when implementing such controls. It also vindicates the need for States to observe their obligations laid down by international law, as recalled by the European Court of Human Rights and the EU Court of the Justice. In fact, in many cases, these jurisdictions highlighted the undoubted relevance of the statutory reserve principle, the principle of necessity or the principle of proportionality, as legal basis for the adoption of measures that include personal data processing.


2016 ◽  
Vol 27 (8) ◽  
pp. 1102-1126 ◽  
Author(s):  
Thi Thanh Huong Tran ◽  
Paul Childerhouse ◽  
Eric Deakins

Purpose The purpose of this paper is to investigate how managers perceive risks associated with sharing information with trading partners, and how they attempt to mitigate them. Design/methodology/approach In this exploratory New Zealand study, qualitative research was conducted involving semi-structured interviews with boundary spanning managers who are responsible for inter-organizational interfaces. Multiple case studies in different industries are used to highlight managers’ perceptions of risks in data exchange process throughout the supply network, and their underlying reasoning. Findings Managers perceive several types of risks when exchanging information across external supply chain interfaces, and adopt different approaches to handling them. The research also reinforces the vital role played by interpersonal relationships and trust as key enablers of inter-organizational cooperation. Research limitations/implications The findings are based on a small sample of 11 case companies based in a single New Zealand province, thereby potentially restricting generalizability. Future work could usefully extend the sample size in order to investigate the correlations between firm sizes, levels of trust, and degrees of data integration within particular industry sectors. Practical implications The findings will help managers understand and evaluate different types of risks in the data exchange process, and enable them to make better decisions that enhance information sharing and supply chain performance. Originality/value Perceived information sharing risks are peculiar to the individual actors, and as such need to be mitigated through changes to their socially constructed perceptions. This work extends the literature on understanding the various dimensions of inter-organizational information sharing.


Sign in / Sign up

Export Citation Format

Share Document